Blog
Three Reasons You Need an Updated Security Policy
Sun, 08/21/2016
If you still think creating and maintaining a security policy isn’t necessary, you could be setting up your organization for an unpleasant surprise. Check out the top three reasons businesses need an up-to-date security policy.
Blog
IT Security Compliance 101
By IT Security Compliance 101 on Sun, 08/21/2016
In this compliance 101 primer, we'll look at three high-profile breaches from the past year, each of which shows what can go wrong when data oversight isn't up to snuff. Along the way, we'll discuss some basic fixes that can help shore up network defenses.
Blog
5 Steps to Streamline Your Network Monitoring Process
By Kevin Jackson on Fri, 08/19/2016
Learn five ways to maximize the efficiency of your network monitoring solution and streamline its implementation to make sure it's keeping your network as healthy as possible.
Blog
7 Network Monitoring Basics Every IT Professional Should Know
By Kevin Jackson on Fri, 08/19/2016
Every organization has a network. Whether you’re a new IT professional or seasoned in technology management, here are seven network monitoring basics you should know.
Blog
The Impact of IPv6 on Network Management
By Kevin Jackson on Fri, 08/19/2016
With the unstoppable growth of IP-enabled devices, the move to IPv6 has been on the minds of network administators for years. Learn how to prepare for the future with the right software in place.
Blog
Why Businesses Thrive When they Monitor and Report on Network Performance
By Kevin Jackson on Fri, 08/19/2016
Far too many organizations fail to take the proactive approach to network oversight. Learn how monitoring and reporting on network performance helps keep business thriving and customers happy.
Blog
Tips for Getting the Budget Greenlight on the Network Monitoring Tools You Need
By Kevin Jackson on Fri, 08/19/2016
Getting budgets approved is no easy feat--especially when it comes to software. Here are a few benefits of network monitoring software that can be useful when making a case to upper management.
Blog
Concerns in Creating a Paperless Office
Thu, 08/18/2016
Identified as a key trend of the future and a way to improve business efficiency, the idea of a “paperless” office (or more realistically, a “less paper” office) is spreading relatively slowly. Why is that?
Blog
User Interfaces: GUI vs. WUI
By Tom Huntington on Tue, 08/16/2016
You might be asking yourself, “What’s a WUI?” At Robot, WUI stands for web user interface, and we think it has some big benefits that are giving the GUI a run for its money.
Blog
What’s New in IBM i 7.2?
By Tom Huntington on Tue, 08/16/2016
May 2, 2014 marked another milestone for the IBM i OS. IBM continues to expand its technology support with its latest release, IBM i 7.2. Take a closer look at the new features you’ll want to know about.
Blog
What’s Really Faster: VTL or LTO?
By Tom Huntington on Tue, 08/16/2016
VTL can be faster than LTO if you take advantage of the virtual features, but if your backup rules stay the same, you may be disappointed. Read on.
Blog
Who's Afraid of IASPs?
By Tom Huntington on Tue, 08/16/2016
As IASP technology continues to grow, so will its uses for high availability (HA) and backups. The result of that will be shrinking hardware costs and complexity and increased redundancy.
Blog
“Confessions” of a CIO: How to Tackle the Toughest Business Challenges
Tue, 08/16/2016
A new book on CIOs should put ‘the cat among the pigeons’ and create some interesting debate amongst IT professionals, particularly about risk taking and tough management decisions.
Blog
Tools for Modernizing IBM i Applications
By Tom Huntington on Tue, 08/16/2016
How can IBM i applications be modernized and brought in line with evolving enterprise expectations for user experience and extensibility? Much of the software for the platform still runs code from the 1990s, which is understandable given binary compatibility, but the truth is that the standard “green screen” isn’t state-of-the-art anymore.
Blog
Is Your Team A Little Rusty on IBM i Operations?
By Tom Huntington on Mon, 08/15/2016
Let’s be honest. Finding good training for your staff and instructors who really know IBM i can be an issue. Luckily, Fortra offers essential training on IBM i operations from experts with over 20 years of experience.
Blog
What is EdTech? A Snapshot of Modern Tech in Schools
By Kevin Jackson on Fri, 08/12/2016
In 2016, technology in schools is on the rise. Read the article for a snapshot of what EdTech is and how it’s growing.
Blog
Learning Cyber Defense Strategies from Stratego Strategy
Thu, 08/11/2016
I grew up in an environment filled with fun and engaging games. My parents, who were Grand Life Masters in the game of Bridge, believed their children could “learn to think” by playing and facing challenges presented by different strategy games. Growing up my family played many hours of strategy games such as Chess, Risk, Bridge, and many others. One of my favorite games was Stratego. As CTO of an...
Blog
Lessons Learned from the Telstra Network Outages
By Kevin Jackson on Thu, 08/11/2016
Real-life network outages are a wake-up call to brands who aren’t taking precautionary measures. Here's what happened to Telstra customers, what Telstra did wrong, and how your business can avoid such a devastating, costly situation.
Blog
Hacktivists Show the Danger of Leaving IBM i Unprotected
Thu, 08/11/2016
Your IBM i is only as secure as you make it. IBM i security experts have been saying this for years, but at least one organization learned the hard way.